Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2014-0616

CVE information

Published

10 years ago

Last Modified

10 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

Juniper Junos 10.4 before 10.4R16, 11.4 before 11.4R10, 12.1R before 12.1R8-S2, 12.1X44 before 12.1X44-D30, 12.1X45 before 12.1X45-D20, 12.1X46 before 12.1X46-D10, 12.2 before 12.2R7, 12.3 before 12.3R4-S2, 13.1 before 13.1R3-S1, 13.2 before 13.2R2, and 13.3 before 13.3R1 allows remote attackers to cause a denial of service (rdp crash) via a large BGP UPDATE message which immediately triggers a withdraw message to be sent, as demonstrated by a long AS_PATH and a large number of BGP Communities..

CVSSv2.0 Score

Severity
High
Base Score
7.1/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
6.9/10
Confidentiality Impact
None
Availability Impact
Complete
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:13.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.1x45:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.1r:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*
  Yes
- -